首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Developing a performance assessment tool for building critical infrastructure resilience through Public-Private Partnership in Ghana 在加纳通过公私伙伴关系开发一种绩效评估工具,用于建设关键基础设施的复原力
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-26 DOI: 10.1016/j.ijcip.2025.100784
Godslove Ampratwum, Robert Osei-Kyei, Vivian W.Y. Tam
In recent years, public-private partnership (PPP) has been advocated for as a medium to build critical infrastructure resilience. PPPs provides an added value achieved from greater co-operation among public-private sector entities. Performance measurement is critical to identify the difficulties and challenges that affects the PPP in executing their role in building critical infrastructure resilience. While the PPP concept is not novel, the precise performance measurement of a PPP in critical infrastructure resilience has not been explored yet. Key performance resilience indicators provide an assessment to measure the performance of a PPP set up to build critical infrastructure resilience. Since the area of performance assessment of PPP in critical infrastructure resilience has not been examined yet, this study used quantitative approach to develop a performance index to help quantify the performance of the PPP in critical infrastructure resilience using fuzzy synthetic evaluation method. The performance index developed consists of four major critical performance criteria groupings: these include, Hazard Detection, Continuity plans, Disruptive event detection, Functional Performance. The evaluation model can be used to objectively determine the performance of a PPP in building critical infrastructure resilience.
近年来,公私伙伴关系(PPP)一直被提倡作为建立关键基础设施弹性的媒介。公私伙伴关系提供了通过公私部门实体之间的更大合作实现的附加价值。绩效衡量对于确定影响PPP在建设关键基础设施弹性方面发挥作用的困难和挑战至关重要。虽然PPP概念并不新颖,但关键基础设施弹性中PPP的精确绩效衡量尚未得到探索。关键绩效弹性指标提供了一种评估,以衡量为建立关键基础设施弹性而建立的PPP绩效。由于关键基础设施弹性PPP绩效评估领域尚未开展研究,本研究采用定量方法,采用模糊综合评价法,制定绩效指标,帮助对关键基础设施弹性PPP绩效进行量化。开发的性能指标包括四个主要的关键性能标准组:这些包括:危害检测、连续性计划、破坏性事件检测、功能性能。该评估模型可用于客观地确定PPP在建设关键基础设施弹性方面的绩效。
{"title":"Developing a performance assessment tool for building critical infrastructure resilience through Public-Private Partnership in Ghana","authors":"Godslove Ampratwum,&nbsp;Robert Osei-Kyei,&nbsp;Vivian W.Y. Tam","doi":"10.1016/j.ijcip.2025.100784","DOIUrl":"10.1016/j.ijcip.2025.100784","url":null,"abstract":"<div><div>In recent years, public-private partnership (PPP) has been advocated for as a medium to build critical infrastructure resilience. PPPs provides an added value achieved from greater co-operation among public-private sector entities. Performance measurement is critical to identify the difficulties and challenges that affects the PPP in executing their role in building critical infrastructure resilience. While the PPP concept is not novel, the precise performance measurement of a PPP in critical infrastructure resilience has not been explored yet. Key performance resilience indicators provide an assessment to measure the performance of a PPP set up to build critical infrastructure resilience. Since the area of performance assessment of PPP in critical infrastructure resilience has not been examined yet, this study used quantitative approach to develop a performance index to help quantify the performance of the PPP in critical infrastructure resilience using fuzzy synthetic evaluation method. The performance index developed consists of four major critical performance criteria groupings: these include, Hazard Detection, Continuity plans, Disruptive event detection, Functional Performance. The evaluation model can be used to objectively determine the performance of a PPP in building critical infrastructure resilience.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100784"},"PeriodicalIF":4.1,"publicationDate":"2025-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144571862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CyberSentry: Enhancing SCADA security through advanced deep learning and optimization strategies 网络哨兵:通过先进的深度学习和优化策略增强SCADA安全性
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-11 DOI: 10.1016/j.ijcip.2025.100782
Alaa O. Khadidos , Adil O. Khadidos , Shitharth Selvarajan , Taher Al-Shehari , Nasser A Alsadhan , Subhav Singh
SCADA systems form the core of infrastructural facilities, including power grids, water treatment facilities, and industrial processes. Changing cyber threats present increasingly sophisticated attacks against which traditional security models inadequately protect SCADA systems. These traditional models usually have drawbacks in the way of inadequate feature selection, inefficiency in detecting most attacks, and suboptimal parameter tuning, which cause vulnerabilities and reduce resilience in systems. This paper presents CyberSentry, a new security framework designed to overcome limitations so as to provide robust protection for SCADA systems. These three modules makeup CyberSentry: the RMIG feature selection model, tri-fusion net for attack detection, and Parrot-Levy Blend Optimization (PLBO) for parameter tuning. The Recursive Multi-Correlation-based Information Gain (RMIG) feature selection model enhances accuracy in detection by optimizing the set of fatal features through recursive multi-correlation analysis by Information Gain prioritization. The Tri-Fusion Net combines anomaly detection, signature-based detection, and machine learning classifiers to enhance the detection versatility and robustness. The PLBO module ensures efficient and dynamic tuning for the parameters through undocumented Parrot and Levy optimization techniques. The proposed CyberSentry framework integrates, within a unified architecture, anomaly detection, signature-based detection, and machine learning classifiers to enhance the security of SCADA systems against diverse cyber threats. Features extracted in this manner are analyzed using machine learning classifiers that exploit their predictive capabilities for robust threat classification. The proposed approaches are fused within the Tri-Fusion Net to complement each other in areas where the separate methods lack certain strengths. This, therefore, ensures broad threat detection, as is validated by extensive testing with various datasets for the assurance of superiority in accuracy and reliability. Validated and tested against a wide variety of datasets, CyberSentry demonstrates an overall accuracy of 99.5 % and a loss of 0.32, proving that this method is both effective and reliable.
SCADA系统构成了基础设施的核心,包括电网、水处理设施和工业过程。不断变化的网络威胁呈现出越来越复杂的攻击,传统的安全模型不足以保护SCADA系统。这些传统模型通常存在特征选择不足、检测大多数攻击的效率低下以及参数调优不理想等缺点,从而导致系统存在漏洞并降低系统的弹性。本文提出了一种新的安全框架CyberSentry,旨在克服限制,为SCADA系统提供强大的保护。这三个模块组成了CyberSentry: RMIG特征选择模型,用于攻击检测的三融合网络,以及用于参数调优的Parrot-Levy混合优化(PLBO)。基于递归多相关的信息增益(RMIG)特征选择模型通过信息增益优先级的递归多相关分析来优化致命特征集,从而提高检测精度。Tri-Fusion网络结合了异常检测、基于签名的检测和机器学习分类器,以增强检测的通用性和鲁棒性。PLBO模块通过未记录的Parrot和Levy优化技术确保了参数的高效和动态调整。提出的CyberSentry框架集成了统一架构内的异常检测、基于签名的检测和机器学习分类器,以增强SCADA系统抵御各种网络威胁的安全性。以这种方式提取的特征使用机器学习分类器进行分析,这些分类器利用其预测能力进行稳健的威胁分类。建议的方法在三融合网中融合,以便在各自方法缺乏某些优势的领域相互补充。因此,这确保了广泛的威胁检测,正如用各种数据集进行的广泛测试所验证的那样,以确保准确性和可靠性的优势。经过各种数据集的验证和测试,CyberSentry的总体准确率为99.5%,损失为0.32,证明了该方法的有效性和可靠性。
{"title":"CyberSentry: Enhancing SCADA security through advanced deep learning and optimization strategies","authors":"Alaa O. Khadidos ,&nbsp;Adil O. Khadidos ,&nbsp;Shitharth Selvarajan ,&nbsp;Taher Al-Shehari ,&nbsp;Nasser A Alsadhan ,&nbsp;Subhav Singh","doi":"10.1016/j.ijcip.2025.100782","DOIUrl":"10.1016/j.ijcip.2025.100782","url":null,"abstract":"<div><div>SCADA systems form the core of infrastructural facilities, including power grids, water treatment facilities, and industrial processes. Changing cyber threats present increasingly sophisticated attacks against which traditional security models inadequately protect SCADA systems. These traditional models usually have drawbacks in the way of inadequate feature selection, inefficiency in detecting most attacks, and suboptimal parameter tuning, which cause vulnerabilities and reduce resilience in systems. This paper presents CyberSentry, a new security framework designed to overcome limitations so as to provide robust protection for SCADA systems. These three modules makeup CyberSentry: the RMIG feature selection model, tri-fusion net for attack detection, and Parrot-Levy Blend Optimization (PLBO) for parameter tuning. The Recursive Multi-Correlation-based Information Gain (RMIG) feature selection model enhances accuracy in detection by optimizing the set of fatal features through recursive multi-correlation analysis by Information Gain prioritization. The Tri-Fusion Net combines anomaly detection, signature-based detection, and machine learning classifiers to enhance the detection versatility and robustness. The PLBO module ensures efficient and dynamic tuning for the parameters through undocumented Parrot and Levy optimization techniques. The proposed CyberSentry framework integrates, within a unified architecture, anomaly detection, signature-based detection, and machine learning classifiers to enhance the security of SCADA systems against diverse cyber threats. Features extracted in this manner are analyzed using machine learning classifiers that exploit their predictive capabilities for robust threat classification. The proposed approaches are fused within the Tri-Fusion Net to complement each other in areas where the separate methods lack certain strengths. This, therefore, ensures broad threat detection, as is validated by extensive testing with various datasets for the assurance of superiority in accuracy and reliability. Validated and tested against a wide variety of datasets, CyberSentry demonstrates an overall accuracy of 99.5 % and a loss of 0.32, proving that this method is both effective and reliable.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100782"},"PeriodicalIF":4.1,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144330246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interdependencies and supply chain 相互依赖关系和供应链
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-07 DOI: 10.1016/S1874-5482(25)00035-6
Roberto Setola
{"title":"Interdependencies and supply chain","authors":"Roberto Setola","doi":"10.1016/S1874-5482(25)00035-6","DOIUrl":"10.1016/S1874-5482(25)00035-6","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100774"},"PeriodicalIF":4.1,"publicationDate":"2025-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144230642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Kolmogorov–Arnold network for cyber–physical system security: A fast and efficient approach 利用Kolmogorov-Arnold网络实现网络物理系统安全:一种快速有效的方法
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-04 DOI: 10.1016/j.ijcip.2025.100768
Mohammadmahdi Ghorbani , Alimohammad Ghassemi , Mohammad Alikhani, Hamid Khaloozadeh, Amirhossein Nikoofard
A cyber–physical system (CPS) is the foundation of modern industrial infrastructures but is vulnerable to cyber attacks due to its connectivity. Detecting these attacks is crucial, driving research into machine learning and deep learning-based models for intrusion detection systems. Many of these models, though effective, suffer from high computational complexity and large parameter counts, limiting their practicality for real-time deployment. Additionally, extensive data preprocessing, commonly used in attack detection, can introduce drawbacks such as loss of critical information, reduced interpretability, and increased latency. This paper employs the Kolmogorov–Arnold network (KAN) as a lightweight and efficient alternative to conventional models for attack detection in CPSs. With a compact architecture and significantly fewer parameters, KAN achieves high classification accuracy while minimizing computational overhead. It eliminates the need for complex feature extraction and preprocessing, preserving data integrity and enabling faster decision-making. Evaluated on the SWaT, WADI, and ICS-Flow datasets, KAN demonstrates superior performance in detecting cyber attacks across binary and multi-class tasks on both physical and network data. Its low inference time and minimal resource requirements make it a practical solution for real-time CPS security.
网络物理系统(CPS)是现代工业基础设施的基础,但由于其连通性,容易受到网络攻击。检测这些攻击至关重要,这将推动对入侵检测系统的机器学习和基于深度学习的模型的研究。其中许多模型虽然有效,但由于计算复杂度高和参数数量大,限制了它们在实时部署中的实用性。此外,广泛的数据预处理(通常用于攻击检测)可能会带来一些缺点,例如丢失关键信息、可解释性降低和延迟增加。本文采用Kolmogorov-Arnold网络(KAN)作为一种轻量级和高效的替代传统的攻击检测模型。凭借紧凑的体系结构和显著减少的参数,KAN实现了高分类精度,同时最大限度地减少了计算开销。它消除了复杂的特征提取和预处理的需要,保持了数据的完整性并实现了更快的决策。在SWaT、WADI和ICS-Flow数据集上进行评估后,KAN在检测物理和网络数据上的二进制和多类任务的网络攻击方面表现出了卓越的性能。其较低的推理时间和最小的资源需求使其成为实时CPS安全的实用解决方案。
{"title":"Using Kolmogorov–Arnold network for cyber–physical system security: A fast and efficient approach","authors":"Mohammadmahdi Ghorbani ,&nbsp;Alimohammad Ghassemi ,&nbsp;Mohammad Alikhani,&nbsp;Hamid Khaloozadeh,&nbsp;Amirhossein Nikoofard","doi":"10.1016/j.ijcip.2025.100768","DOIUrl":"10.1016/j.ijcip.2025.100768","url":null,"abstract":"<div><div>A cyber–physical system (CPS) is the foundation of modern industrial infrastructures but is vulnerable to cyber attacks due to its connectivity. Detecting these attacks is crucial, driving research into machine learning and deep learning-based models for intrusion detection systems. Many of these models, though effective, suffer from high computational complexity and large parameter counts, limiting their practicality for real-time deployment. Additionally, extensive data preprocessing, commonly used in attack detection, can introduce drawbacks such as loss of critical information, reduced interpretability, and increased latency. This paper employs the Kolmogorov–Arnold network (KAN) as a lightweight and efficient alternative to conventional models for attack detection in CPSs. With a compact architecture and significantly fewer parameters, KAN achieves high classification accuracy while minimizing computational overhead. It eliminates the need for complex feature extraction and preprocessing, preserving data integrity and enabling faster decision-making. Evaluated on the SWaT, WADI, and ICS-Flow datasets, KAN demonstrates superior performance in detecting cyber attacks across binary and multi-class tasks on both physical and network data. Its low inference time and minimal resource requirements make it a practical solution for real-time CPS security.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100768"},"PeriodicalIF":4.1,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144240246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transposing EU-legislation on critical infrastructure protection legal implementation performance in the Baltic Sea region 欧盟关于关键基础设施保护的立法在波罗的海地区的法律实施绩效
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-03 DOI: 10.1016/j.ijcip.2025.100781
Marie Becker
Both, in the Russian war of aggression against Ukraine and in the proliferation of hybrid attacks on EU territory, critical energy infrastructure has become a primary target. One EU- response to the ensuing need for transnational action consists in the CER-Directive of 2022 on the resilience of critical entities. Its effectiveness now hinges on national implementation, currently pervaded by delay despite the undisputable urgency. To begin to shed some light, this study analyses legal implementation of the directive’s predecessor (ECI-Directive of 2008) to assess explanatory approaches from the discipline of implementation studies in the particular field of critical infrastructure protection. Focusing on the hotspot Baltic Sea Region, it shows how country-specific generalized expectations do not hold and how fundamental misfit between pre-existing national frameworks and a directive can instead help predict deviation. For the ECI-Directive, the study shows significant delays and deviation for individual countries, as well as only limited harmonization across the region.
无论是在俄罗斯侵略乌克兰的战争中,还是在针对欧盟领土的混合攻击不断扩散的情况下,关键的能源基础设施都已成为主要目标。欧盟对随之而来的跨国行动需求的回应之一是关于关键实体复原力的2022年cer指令。它的有效性现在取决于各国的执行情况,尽管其紧迫性无可争辩,但目前普遍存在拖延现象。为了开始揭示一些信息,本研究分析了该指令的前身(2008年eci指令)的法律实施,以评估关键基础设施保护特定领域实施研究学科的解释方法。该报告以波罗的海热点地区为重点,展示了具体国家的普遍预期如何不成立,以及现有国家框架与指令之间的根本不匹配如何有助于预测偏差。就eci指令而言,研究表明,个别国家存在明显的延迟和偏差,整个地区的协调也很有限。
{"title":"Transposing EU-legislation on critical infrastructure protection legal implementation performance in the Baltic Sea region","authors":"Marie Becker","doi":"10.1016/j.ijcip.2025.100781","DOIUrl":"10.1016/j.ijcip.2025.100781","url":null,"abstract":"<div><div>Both, in the Russian war of aggression against Ukraine and in the proliferation of hybrid attacks on EU territory, critical energy infrastructure has become a primary target. One EU- response to the ensuing need for transnational action consists in the CER-Directive of 2022 on the resilience of critical entities. Its effectiveness now hinges on national implementation, currently pervaded by delay despite the undisputable urgency. To begin to shed some light, this study analyses legal implementation of the directive’s predecessor (ECI-Directive of 2008) to assess explanatory approaches from the discipline of implementation studies in the particular field of critical infrastructure protection. Focusing on the hotspot Baltic Sea Region, it shows how country-specific generalized expectations do not hold and how fundamental misfit between pre-existing national frameworks and a directive can instead help predict deviation. For the ECI-Directive, the study shows significant delays and deviation for individual countries, as well as only limited harmonization across the region.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100781"},"PeriodicalIF":4.1,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144366828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-enhanced intrusion detection in smart renewable energy grids: A novel industry 4.0 cyber threat management approach 智能可再生能源电网中人工智能增强的入侵检测:一种新的工业4.0网络威胁管理方法
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-19 DOI: 10.1016/j.ijcip.2025.100769
Umar Islam , Hanif Ullah , Naveed Khan , Kashif Saleem , Iftikhar Ahmad
The rapid adoption of Industry 4.0 technologies in renewable energy grids has significantly improved efficiency and scalability. However, this integration has also amplified cybersecurity risks, making conventional Intrusion Detection Systems (IDS) insufficient against evolving cyber threats. This study proposes a novel AI-enhanced Intrusion Detection System (IDS) tailored for smart renewable energy grids, leveraging a multi-stage detection framework that integrates both supervised and unsupervised learning techniques. The proposed IDS combines Random Forest for signature-based detection and Autoencoders for anomaly-based threat identification, enabling real-time detection of both known and zero-day cyber threats. A comprehensive evaluation using real-world cyberattack datasets demonstrates that the system achieves a detection accuracy of 97.8 %, significantly reducing false positives compared to traditional IDS solutions. This work not only enhances the security and resilience of smart grids but also offers a scalable and adaptable cybersecurity framework for Industry 4.0 applications. The findings contribute to the advancement of AI-driven security mechanisms, ensuring the reliability of critical energy infrastructure in the face of sophisticated cyber threats.
工业4.0技术在可再生能源电网中的快速应用显著提高了效率和可扩展性。然而,这种整合也放大了网络安全风险,使传统的入侵检测系统(IDS)不足以应对不断发展的网络威胁。本研究提出了一种针对智能可再生能源电网量身定制的新型人工智能增强入侵检测系统(IDS),利用集成有监督和无监督学习技术的多阶段检测框架。提出的IDS结合了基于签名的随机森林检测和基于异常的自动编码器威胁识别,能够实时检测已知和零日网络威胁。使用真实网络攻击数据集进行的综合评估表明,与传统的IDS解决方案相比,该系统的检测准确率达到97.8%,大大减少了误报。这项工作不仅增强了智能电网的安全性和弹性,还为工业4.0应用提供了可扩展和适应性强的网络安全框架。这些发现有助于推进人工智能驱动的安全机制,确保关键能源基础设施在面对复杂的网络威胁时的可靠性。
{"title":"AI-enhanced intrusion detection in smart renewable energy grids: A novel industry 4.0 cyber threat management approach","authors":"Umar Islam ,&nbsp;Hanif Ullah ,&nbsp;Naveed Khan ,&nbsp;Kashif Saleem ,&nbsp;Iftikhar Ahmad","doi":"10.1016/j.ijcip.2025.100769","DOIUrl":"10.1016/j.ijcip.2025.100769","url":null,"abstract":"<div><div>The rapid adoption of Industry 4.0 technologies in renewable energy grids has significantly improved efficiency and scalability. However, this integration has also amplified cybersecurity risks, making conventional Intrusion Detection Systems (IDS) insufficient against evolving cyber threats. This study proposes a novel AI-enhanced Intrusion Detection System (IDS) tailored for smart renewable energy grids, leveraging a multi-stage detection framework that integrates both supervised and unsupervised learning techniques. The proposed IDS combines Random Forest for signature-based detection and Autoencoders for anomaly-based threat identification, enabling real-time detection of both known and zero-day cyber threats. A comprehensive evaluation using real-world cyberattack datasets demonstrates that the system achieves a detection accuracy of 97.8 %, significantly reducing false positives compared to traditional IDS solutions. This work not only enhances the security and resilience of smart grids but also offers a scalable and adaptable cybersecurity framework for Industry 4.0 applications. The findings contribute to the advancement of AI-driven security mechanisms, ensuring the reliability of critical energy infrastructure in the face of sophisticated cyber threats.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100769"},"PeriodicalIF":4.1,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144139400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the nuclear supply chain: Addressing the issue of counterfeiting 保障核供应链:解决假冒问题
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-16 DOI: 10.1016/j.ijcip.2025.100767
Christopher Hobbs , Zoha Naser , Sarah Tzinieris
In 2024, exploding pagers and walkie-talkies in Lebanon dramatically highlighted the importance of supply chain security and the risk that counterfeiting can pose. This article seeks to explore these issues in the nuclear context. Drawing on new empirical research, it examines how counterfeited materials, items, and technologies have found their way into nuclear supply chains and ultimately to facilities, exploring the impact of this and how the international community has responded. It finds that although counterfeits can and indeed have created significant nuclear risks, historically this issue has received relatively little attention. Here, a general lack of awareness, an overly narrow focus on their impact on critical safety systems, and the absence of comprehensive reporting mechanisms mean that the number of known counterfeits that have penetrated nuclear facilities globally is likely to be significantly underestimated. Although new international efforts in this area aimed at securing the nuclear supply chain have been launched in recent years, there remains much to be done, with considerable variation in the maturity of different countries and organizations’ approaches to this issue.
2024年,黎巴嫩的寻呼机和对讲机爆炸,极大地突出了供应链安全的重要性以及假冒产品可能带来的风险。本文试图在核背景下探讨这些问题。根据新的实证研究,报告审查了假冒材料、物品和技术如何进入核供应链并最终进入核设施,探讨了这种情况的影响以及国际社会如何作出反应。报告发现,尽管仿冒品能够而且确实已经造成了重大的核风险,但从历史上看,这个问题受到的关注相对较少。在这方面,普遍缺乏认识,过于狭隘地关注它们对关键安全系统的影响,以及缺乏全面的报告机制意味着,渗透到全球核设施的已知假冒产品的数量可能被严重低估。尽管近年来在这一领域开展了旨在确保核供应链安全的新的国际努力,但仍有许多工作要做,不同国家和组织在这一问题上的成熟程度存在很大差异。
{"title":"Securing the nuclear supply chain: Addressing the issue of counterfeiting","authors":"Christopher Hobbs ,&nbsp;Zoha Naser ,&nbsp;Sarah Tzinieris","doi":"10.1016/j.ijcip.2025.100767","DOIUrl":"10.1016/j.ijcip.2025.100767","url":null,"abstract":"<div><div>In 2024, exploding pagers and walkie-talkies in Lebanon dramatically highlighted the importance of supply chain security and the risk that counterfeiting can pose. This article seeks to explore these issues in the nuclear context. Drawing on new empirical research, it examines how counterfeited materials, items, and technologies have found their way into nuclear supply chains and ultimately to facilities, exploring the impact of this and how the international community has responded. It finds that although counterfeits can and indeed have created significant nuclear risks, historically this issue has received relatively little attention. Here, a general lack of awareness, an overly narrow focus on their impact on critical safety systems, and the absence of comprehensive reporting mechanisms mean that the number of known counterfeits that have penetrated nuclear facilities globally is likely to be significantly underestimated. Although new international efforts in this area aimed at securing the nuclear supply chain have been launched in recent years, there remains much to be done, with considerable variation in the maturity of different countries and organizations’ approaches to this issue.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100767"},"PeriodicalIF":4.1,"publicationDate":"2025-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144185048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPSMInfer: Industrial proprietary protocol state machine inference from network traces IPSMInfer:工业专有协议状态机从网络轨迹推断
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-10 DOI: 10.1016/j.ijcip.2025.100765
Yahui Yang, Yangyang Geng, Qiang Wei, Rongkuan Ma, Zihan Wei
Industrial protocols are ubiquitous in industrial control systems (ICS), and their security is intimately tied to the entire industrial infrastructure. Analyzing industrial protocol state machines can assist researchers in understanding the protocol’s state transition rules, event-triggering conditions, and behavioral characteristics. However, the proprietary nature of many industrial protocols and the lack of knowledge about their state machines significantly impede the implementation of related protection measures in ICS. While several protocol state machine inference methods have been proposed, few are practically and widely applicable to industrial protocols. This is primarily attributed to the unique structure of industrial protocols, which poses challenges for protocol state machine inference.
This paper introduces IPSMInfer, a framework that automatically infers industrial proprietary protocol state machines from network traffic. IPSMInfer labels message types based on the length of preprocessed request–response messages, which eliminates the need to identify key protocol fields and restore the original protocol formats. Subsequently, a directed graph is created using the message type labeling results along with their timing relationships to generate a protocol state machine. Finally, the generated protocol state machine is optimized by replaying captured protocol messages and actively interacting with protocol entities to ensure its accuracy and efficiency. We evaluated IPSMInfer using seven programmable logic controllers (PLCs) from five different industrial manufacturers, applying five distinct industrial proprietary protocols. The experimental results clearly demonstrate that IPSMInfer can accurately infer the state machines of these industrial proprietary protocols. It outperforms open-source tools such as ReverX and Netzob by an average of 19.8% and 8.8%, respectively, in terms of protocol state labeling perfection.
工业协议在工业控制系统(ICS)中无处不在,其安全性与整个工业基础设施密切相关。分析工业协议状态机可以帮助研究人员理解协议的状态转换规则、事件触发条件和行为特征。然而,许多工业协议的专有性质以及缺乏对其状态机的了解严重阻碍了ICS中相关保护措施的实现。虽然已经提出了几种协议状态机推理方法,但很少有实际和广泛适用于工业协议的方法。这主要归因于工业协议的独特结构,这给协议状态机推理带来了挑战。本文介绍了一个从网络流量中自动推断工业专用协议状态机的框架IPSMInfer。IPSMInfer根据预处理的请求-响应消息的长度标记消息类型,从而消除了识别关键协议字段和恢复原始协议格式的需要。随后,使用消息类型标记结果及其定时关系创建有向图,以生成协议状态机。最后,通过重放捕获的协议消息并主动与协议实体交互来优化生成的协议状态机,以确保其准确性和效率。我们使用来自五家不同工业制造商的七种可编程逻辑控制器(plc)评估ipsmminfer,应用五种不同的工业专有协议。实验结果清楚地表明,IPSMInfer可以准确地推断出这些工业专有协议的状态机。在协议状态标记完美性方面,它比开源工具(如ReverX和Netzob)平均分别高出19.8%和8.8%。
{"title":"IPSMInfer: Industrial proprietary protocol state machine inference from network traces","authors":"Yahui Yang,&nbsp;Yangyang Geng,&nbsp;Qiang Wei,&nbsp;Rongkuan Ma,&nbsp;Zihan Wei","doi":"10.1016/j.ijcip.2025.100765","DOIUrl":"10.1016/j.ijcip.2025.100765","url":null,"abstract":"<div><div>Industrial protocols are ubiquitous in industrial control systems (ICS), and their security is intimately tied to the entire industrial infrastructure. Analyzing industrial protocol state machines can assist researchers in understanding the protocol’s state transition rules, event-triggering conditions, and behavioral characteristics. However, the proprietary nature of many industrial protocols and the lack of knowledge about their state machines significantly impede the implementation of related protection measures in ICS. While several protocol state machine inference methods have been proposed, few are practically and widely applicable to industrial protocols. This is primarily attributed to the unique structure of industrial protocols, which poses challenges for protocol state machine inference.</div><div>This paper introduces IPSMInfer, a framework that automatically infers industrial proprietary protocol state machines from network traffic. IPSMInfer labels message types based on the length of preprocessed request–response messages, which eliminates the need to identify key protocol fields and restore the original protocol formats. Subsequently, a directed graph is created using the message type labeling results along with their timing relationships to generate a protocol state machine. Finally, the generated protocol state machine is optimized by replaying captured protocol messages and actively interacting with protocol entities to ensure its accuracy and efficiency. We evaluated IPSMInfer using seven programmable logic controllers (PLCs) from five different industrial manufacturers, applying five distinct industrial proprietary protocols. The experimental results clearly demonstrate that IPSMInfer can accurately infer the state machines of these industrial proprietary protocols. It outperforms open-source tools such as ReverX and Netzob by an average of 19.8% and 8.8%, respectively, in terms of protocol state labeling perfection.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100765"},"PeriodicalIF":4.1,"publicationDate":"2025-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143928466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International perspectives on critical infrastructure: Evaluation criteria and definitions 关键基础设施的国际视角:评价标准和定义
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-09 DOI: 10.1016/j.ijcip.2025.100761
EdvanGomes da Silva , MarcusAurélioCarvalho Georg , LuizAntônioRibeiro Júnior , LeonardoRodrigo Ferreira , LaertePeotta de Melo , RafaelRabelo Nunes
Contemporary society heavily relies on systems that process, store, and transmit sensitive and confidential information. However, defining what constitutes critical assets and how to categorize them presents challenges. In this context, applying criteria for classifying Critical Infrastructures (CIs) is essential to determine their criticality for information owners. This study aims to identify which criteria are used to classify an asset as part of CIs based on data from various nations. The methodology adopted involved analyzing public documents that evaluated the definitions and assessment criteria of CIs from 12 countries and organizations. The study’s results provide a technical understanding of the criteria used to define Critical Infrastructures CIs among the analyzed countries, highlighting a predominance of criteria related to people, social aspects, economic factors, geographic considerations, and interdependencies. These findings indicate a consistent alignment among the studied nations regarding the criteria that define their respective CIs. These findings have practical implications for risk and asset managers, equipping them with the necessary knowledge to apply CI assessment methodologies effectively.
当代社会严重依赖于处理、存储和传输敏感和机密信息的系统。然而,定义什么构成了关键资产以及如何对它们进行分类是一项挑战。在这种情况下,应用对关键基础设施(ci)进行分类的标准对于确定其对信息所有者的重要性至关重要。本研究旨在根据各国的数据确定哪些标准用于将资产分类为ci的一部分。所采用的方法包括分析评价12个国家和组织的ci定义和评价标准的公开文件。该研究的结果提供了对所分析国家中用于定义关键基础设施ci的标准的技术理解,强调了与人、社会方面、经济因素、地理考虑和相互依赖性相关的标准的优势。这些发现表明,在所研究的国家中,对于定义各自ci的标准,存在一致的一致性。这些发现对风险和资产管理人员具有实际意义,使他们具备有效应用CI评估方法的必要知识。
{"title":"International perspectives on critical infrastructure: Evaluation criteria and definitions","authors":"EdvanGomes da Silva ,&nbsp;MarcusAurélioCarvalho Georg ,&nbsp;LuizAntônioRibeiro Júnior ,&nbsp;LeonardoRodrigo Ferreira ,&nbsp;LaertePeotta de Melo ,&nbsp;RafaelRabelo Nunes","doi":"10.1016/j.ijcip.2025.100761","DOIUrl":"10.1016/j.ijcip.2025.100761","url":null,"abstract":"<div><div>Contemporary society heavily relies on systems that process, store, and transmit sensitive and confidential information. However, defining what constitutes critical assets and how to categorize them presents challenges. In this context, applying criteria for classifying Critical Infrastructures (<em>CIs</em>) is essential to determine their criticality for information owners. This study aims to identify which criteria are used to classify an asset as part of <em>CIs</em> based on data from various nations. The methodology adopted involved analyzing public documents that evaluated the definitions and assessment criteria of <em>CIs</em> from 12 countries and organizations. The study’s results provide a technical understanding of the criteria used to define Critical Infrastructures <em>CIs</em> among the analyzed countries, highlighting a predominance of criteria related to people, social aspects, economic factors, geographic considerations, and interdependencies. These findings indicate a consistent alignment among the studied nations regarding the criteria that define their respective <em>CIs</em>. These findings have practical implications for risk and asset managers, equipping them with the necessary knowledge to apply CI assessment methodologies effectively.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100761"},"PeriodicalIF":4.1,"publicationDate":"2025-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience in cogeneration systems: Graphical analysis of novel indexes and system behavior under failure scenarios 热电联产系统的弹性:故障情况下新指标和系统行为的图形分析
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-07 DOI: 10.1016/j.ijcip.2025.100764
Fellipe Sartori da Silva , Thiago Magalhães Lessa , José Alexandre Matelli
With the increasing frequency and severity of disasters threatening energy systems, resilience has emerged as a crucial concept in the energy field, addressing the consequences of high-impact, low-probability (HILP) events. Despite its importance, there remains a lack of consensus on how to assess resilience, with energy generation systems, particularly thermal power plants, receiving limited attention in existing investigations. This study advances the development of a robust method for resilience evaluation in energy generation systems through an innovative graphical analysis applied to four cogeneration plants. The proposed method introduces two novel parameters: operability and generation indexes. The decay curves of the operability index reveal an initial downward curvature followed by an inflection point, while the generation index exhibits a sharp decline during the first hours of operation. Efforts to enhance resilience in the early design phase should focus on mitigating these patterns. The derivatives of the curves identified key periods of operational instability, specifically, the initial phase and the most degrading periods. Improved system conditions reduced these instabilities by minimizing the amplitude of the derivative peaks. By integrating the curves, the relative area under the graphs was quantified, revealing that the studied configurations utilizing gas turbines experienced greater sensitivity to HILP events. These findings underscore the importance of proactive resilience strategies tailored to the design and operational characteristics of energy systems.
随着威胁能源系统的灾害日益频繁和严重,弹性已成为能源领域的一个重要概念,用于解决高影响、低概率(HILP)事件的后果。尽管它很重要,但在如何评估恢复力方面仍然缺乏共识,能源发电系统,特别是火力发电厂,在现有的调查中受到的关注有限。本研究通过一个创新的图形分析应用于四个热电联产厂,促进了能源发电系统弹性评估的鲁棒方法的发展。该方法引入了两个新参数:可操作性指标和生成指标。可操作性指数的衰减曲线呈现出先下降后出现拐点的趋势,而发电指数在运行前几个小时急剧下降。在早期设计阶段增强弹性的努力应该集中在减轻这些模式上。曲线的导数确定了运行不稳定的关键时期,即初始阶段和最退化时期。改进的系统条件通过最小化导数峰值的振幅来减少这些不稳定性。通过对曲线的积分,对图下的相对面积进行了量化,揭示了所研究的利用燃气轮机的配置对HILP事件的敏感度更高。这些发现强调了根据能源系统的设计和运行特点量身定制的主动弹性策略的重要性。
{"title":"Resilience in cogeneration systems: Graphical analysis of novel indexes and system behavior under failure scenarios","authors":"Fellipe Sartori da Silva ,&nbsp;Thiago Magalhães Lessa ,&nbsp;José Alexandre Matelli","doi":"10.1016/j.ijcip.2025.100764","DOIUrl":"10.1016/j.ijcip.2025.100764","url":null,"abstract":"<div><div>With the increasing frequency and severity of disasters threatening energy systems, resilience has emerged as a crucial concept in the energy field, addressing the consequences of high-impact, low-probability (HILP) events. Despite its importance, there remains a lack of consensus on how to assess resilience, with energy generation systems, particularly thermal power plants, receiving limited attention in existing investigations. This study advances the development of a robust method for resilience evaluation in energy generation systems through an innovative graphical analysis applied to four cogeneration plants. The proposed method introduces two novel parameters: operability and generation indexes. The decay curves of the operability index reveal an initial downward curvature followed by an inflection point, while the generation index exhibits a sharp decline during the first hours of operation. Efforts to enhance resilience in the early design phase should focus on mitigating these patterns. The derivatives of the curves identified key periods of operational instability, specifically, the initial phase and the most degrading periods. Improved system conditions reduced these instabilities by minimizing the amplitude of the derivative peaks. By integrating the curves, the relative area under the graphs was quantified, revealing that the studied configurations utilizing gas turbines experienced greater sensitivity to HILP events. These findings underscore the importance of proactive resilience strategies tailored to the design and operational characteristics of energy systems.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100764"},"PeriodicalIF":4.1,"publicationDate":"2025-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143928465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1